to the IT Standard Rules this time are summarized as follows: (1) Establishing IT-related risk assessment criteria to define the entity’s risk level and to specify standards of IT security controls
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
Data report_year report_month security_type offr_type_abbr_name n_security d_listed sell_unit sell_val last_updated 2014 2 Security IPO AJA Feb 27 2014 12:00AM 0 0 2024-08-09 2014 3 Security IPO LIT
แบบสอบถามเกี่ยวกับแนวทางการบริหารความปลอดภัยของระบบสารสนเทศ (Information Security Questionnaire)
remedy the emergency situation related to security; re: to prohibit the people gathering, carrying out activity and conspiracy concerning the risk to spread the disease in the country except the family
Invoicing Core Banking SAP Back office system ATM IT Organization IT process System development and program changes Network and security management IT service operationIT Planning and Organization 4 Why DO WE
of exploring and gathering documents and evidence as well as more information from overseas authorities for valuation of overseas investment. The SEC therefore allowed VTE to submit the audited
. Drafting single form is based on the principle of gathering necessary and sufficient information to ensure provision of appropriate services in compliance with the law, and to provide ease of filing for
No. OrThor/Nor. 5/2547 Re: Operational Control and Security of the Information Technology of Securities Company For the purpose of rendering the securities companies to efficiently comply with the
: Operational Control and Security of the Information Technology of Securities Company For the purpose of rendering the securities companies to efficiently comply with the Notification of the Office of Securities